.. / CVE-2021-29156

Exploit for LDAP Injection In OpenAM (CVE-2021-29156)

Description:

OpenAM contains an LDAP injection vulnerability. When a user tries to reset his password, they are asked to enter username, and then the backend validates whether the user exists or not through an LDAP query. If the user exists, the password reset token is sent to the user’s email. Enumeration can allow for full password retrieval.

Nuclei Template

View the template here CVE-2021-29156.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-29156.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2021-29156
https://bugster.forgerock.org/jira/browse/OPENAM-10135
https://github.com/ARPSyndicate/cvemon
https://github.com/sullo/advisory-archives/blob/master/Forgerock_OpenAM_LDAP_injection.md https://hackerone.com/reports/1278050 https://www.guidepointsecurity.com/blog/ldap-injection-in-forgerock-openam-exploiting-cve-2021-29156/ https://portswigger.net/research/hidden-oauth-attack-vectors
https://github.com/ARPSyndicate/kenzer-templates
https://portswigger.net/research/hidden-oauth-attack-vectors